General
-
Target
M1NLW_t.exe
-
Size
16.1MB
-
Sample
250308-cf2b3azxg1
-
MD5
79478cd85097af98b283da65a51e90a6
-
SHA1
e5afffd315eb5aefdf5ee0c8a34a4c2c8062d864
-
SHA256
bb8ca04452ebab8e2aadb0e2af145ae1bfbfe78d733057cb0a6d0b13ceb68074
-
SHA512
6a8f041981daa4d94ea7535bdaa40a96c511a2c3ad4877a9d961e752e9aebb96a35f67cca5f4d3398e71217b4d0bd41056481b66643399609babe5ffb52f60c7
-
SSDEEP
393216:c9YiicgwR1FfHqO1UyXMCHWUjlVg74w45fPVBFHCRJc8:c9YiPXiyXMb8PDw45fPVqRO8
Behavioral task
behavioral1
Sample
M1NLW_t.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
M1NLW_t.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
thetest.selfhost.co:1339
hyd6qZsPPsPPgljc
-
Install_directory
%ProgramData%
-
install_file
DirectOutputService.exe
Targets
-
-
Target
M1NLW_t.exe
-
Size
16.1MB
-
MD5
79478cd85097af98b283da65a51e90a6
-
SHA1
e5afffd315eb5aefdf5ee0c8a34a4c2c8062d864
-
SHA256
bb8ca04452ebab8e2aadb0e2af145ae1bfbfe78d733057cb0a6d0b13ceb68074
-
SHA512
6a8f041981daa4d94ea7535bdaa40a96c511a2c3ad4877a9d961e752e9aebb96a35f67cca5f4d3398e71217b4d0bd41056481b66643399609babe5ffb52f60c7
-
SSDEEP
393216:c9YiicgwR1FfHqO1UyXMCHWUjlVg74w45fPVBFHCRJc8:c9YiPXiyXMb8PDw45fPVqRO8
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1